
Course Outline
By the end of this course, you will learn:
● CIA (Confidentiality, Integrity, and Availability) triad of information security which is an information security benchmark model used to evaluate the information security of an organization
● Hackers Tools, Techniques and Exploits
● Implementing and Auditing Key Security Controls
● Intrusion Detection in depth
● Continuous Monitoring and Security Operations
● Incident Handling
● Cloud Security Architecture and Operations
● Penetration Testing and Ethical Hacking Overview
Course Severity – Basic
Course Duration – Approximately 35 Hours (4 weekends)
Class Requirements
- A Windows/Mac PC/Laptop capable of virtualization
- Basic knowledge of IP addressing, familiarization with ports and services, configuring network adapter, PING, IFCONFIG, IPCONFIG
- Reliable LAN or cable connection for Internet access
- Host machine running Windows 10 or Mac
- You should have a minimum of 4 GB of RAM (8 GB preferred)